Corporate Data Sharing, Leakage, and Supervision Mechanism Research
Abstract
:1. Introduction
- (1)
- Considering the influencing factors of inter-company data sharing, leakage, and supervision behaviors, establish a data sharing, leakage, and supervision model, and analyze corporate data sharing and leakage behaviors.
- (2)
- Considering the data technical capabilities of both parties of the data sharing alliance and the revenue or loss of data leakage, design a data supervision mechanism based on fines and analyze how different levels of supervision affect data sharing and leakage behavior.
- (3)
- Solve the game equilibrium and conditions of company supervision under different technical levels, data leaking behaviors, and data leaking penalty levels, and then discuss the stability conditions of Data Sharing Alliance, as well as data sharing, data leakage, and data supervision of companies’ effectiveness strategies.
- (4)
- Simulation analysis is used to verify the validity and accuracy of the model, analyze the impact of data supervision mechanism on the game decision-making of data sharing alliance, and provide a scientific basis for enterprise data sharing, data leakage, and supervision. In the extended discussion, the case of “SF: Data War” from Harvard Business School is cited to further discuss the management role of regulatory mechanism in the actual data sharing process.
2. Theoretical Background
2.1. Data Sharing
2.2. Data Leakage
2.3. Data Supervision
3. Data Sharing, Leakage, and Supervision Model
3.1. Problem Description
3.2. Model Analysis of Data Sharing, Leakage and Supervision Mechanism
3.2.1. Data Shared Benefit Analysis
3.2.2. Scale Analysis of Data Leakage
3.2.3. Benefit and Cost Analysis of Data Leakage
3.2.4. Analysis of the Impact of Related Data Technology Levels
3.2.5. Analysis of Data Supervision Mechanism
3.3. Basic Model
4. Model Analysis
4.1. Equilibrium Analysis of S1 Strategy
4.2. Equilibrium Analysis of S2 and S3 Strategy
4.3. Nash Equilibrium Analysis of S4 Strategy
4.4. Nash Game Equilibrium Distribution under Different Supervision Mechanisms
5. Simulation Analysis
5.1. Equilibrium Strategy Analysis under Different Data Supervision Mechanisms
5.1.1. Supervision Mechanism for Mild Penalties
5.1.2. Supervision Mechanism for Severe Penalties
5.2. Extension Discussion of “SF Express Company: Data War”
5.2.1. SF Express and Cainao Data Sharing Case Background
5.2.2. If There Is No Data Supervision on Company Sharing, It Is Difficult to Avoid Data Leakage
5.2.3. According to the Data Sharing Needs, the Company Can Choose the Punishment Level and Supervise the Data Sharing Process
5.2.4. Under the mutual Supervision Mechanism of Data Sharing, the Company Allows Members of the Sharing Alliance to Leak Data
6. Conclusions
6.1. S1 Strategy Equilibrium Is the Best Sharing Strategy for Data Alliance
6.2. S2 or S3 Nash Equilibrium Needs to Meet or
6.3. S4 Nash Equilibrium Needs to Meet , Company A and B Choose the “Sharing and Leaking Data” Sub-Strategy
6.4. Further Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Gruschka, N.; Mavroeidis, V.; Vishi, K.; Jensen, M. Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 5027–5033. [Google Scholar]
- Kim, J.H. Overview of disciplinary data sharing practices and promotion of open data in science. Sci. Ed. 2019, 6, 3–9. [Google Scholar] [CrossRef]
- Zuiderwijk, A.; Janssen, M.; Susha, I. Improving the speed and ease of open data use through metadata, interaction mechanisms, and quality indicators. J. Organ. Comp. Electron. Commer 2016, 26, 116–146. [Google Scholar] [CrossRef]
- Zhu, Q.; Krikke, H.; Caniels, M.C. Supply chain integration: Value creation through management inter-organizational learning. Int. J. Oper. Prod. Manag. 2018, 38, 211–229. [Google Scholar] [CrossRef]
- Simeng, W.; Jing, R.; Yunfei, S. Study on the impact mechanism of alliance conventions on the dual innovation capability of enterprises. Manage 2019, 32, 19–32. [Google Scholar]
- Van Der Klerj, R.; Wijn, R.; Hof, T. An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Comput. Secur. 2020, 97, 101970. [Google Scholar] [CrossRef]
- Goode, S.; Hoehle, H.; Venkatesh, V.; Brown, S.A. User compensation as a data breach recovery action: An investigation of the Sony PlayStation network breach. MIS Q. 2017, 41, 703–727. [Google Scholar] [CrossRef]
- Chen, H.S.; Jai, T.M. Trust fall: Data breach perceptions from loyalty and non-loyalty customers. Serv. Ind. J. 2019, 4, 1–17. [Google Scholar] [CrossRef]
- Cheng, L.; Liu, F.; Yao, D. Enterprise data breach: Causes, challenges, prevention, and future directions: Enterprise data breach. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2017, 7, e1211. [Google Scholar] [CrossRef]
- Srinivasan, S.; Pitcher, Q. Harvard Business Review. Data Breach at Equifax. 2018. Available online: https://store.hbr.org/product/data-breach-at-equifax/118031?sku=118031-PDF-ENG (accessed on 21 October 2017).
- Cuinan, M.J.; Williams, C.C. How ethics can enhance organizational privacy: Lessons from the Choice Point and TJX data breaches. Mis Q. 2009, 33, 673–687. [Google Scholar]
- Goel, S.; Shawky, H.A. Management. Estimating the market impact of security breach announcements on firm values. Inf. Manag. 2009, 46, 404–410. [Google Scholar] [CrossRef]
- Gerlach, J.P.; Eling, N.; Wessels, N.; Buxmann, P. Flamingos on a slackline: Companies’ challenges of balancing the competing demands of handling customer information and privacy. Inf. Syst. J. 2019, 29, 548–575. [Google Scholar] [CrossRef]
- Zafar, H.K.; Ko, M.; Osei-Bryson, K.M. Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors. Inf. Resour. Manag. J. 2012, 25, 21–37. [Google Scholar] [CrossRef] [Green Version]
- Sen, R.; Borle, S. Estimating the Contextual Risk of Data Breach: An Empirical Approach. J. Manag. Inform. Syst. 2015, 32, 314–341. [Google Scholar] [CrossRef]
- Johnson, M.E. Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain. J. Manag. Inform. Syst. 2008, 25, 97–124. [Google Scholar] [CrossRef] [Green Version]
- Bromiley, P.; McShane, M.; Nair, A.; Rustambekov, E. Enterprise Risk Management: Review, Critique, and Research Directions. Long Range Plan. 2015, 48, 265–276. [Google Scholar] [CrossRef] [Green Version]
- Yeung, A.K.W.; Hall, G.B. Spatial Data Sharing, Data Warehousing and Database Federation. Available online: https://www.buecher.de/shop/geoinformationssystem/spatial-database-systems-ebook-pdf/ebook-pdf/products_products/detail/prod_id/37353573/ (accessed on 23 May 2007).
- Shin, S.; Kim, J.Y.; Le, M.; Shin, Y.H.; Kim, M.K. Implementation of Research Data Platform: In the Perspective of Data Transfer. In Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, 2–5 July 2019; pp. 735–737. [Google Scholar]
- Lu, Y.; Huang, X.; Li, D.; Zhang, Y. Collaborative Graph-Based Mechanism for Distributed Big Data Leakage Prevention. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–7. [Google Scholar]
- Xu, H.; He, Q.; Li, X.; Jiang, B.; Qin, K. BDSS-FA: A Blockchain-Based Data Security Sharing Platform with Fine-Grained Access Control. IEEE Access 2020, 8, 87552–87561. [Google Scholar] [CrossRef]
- Saatc, C.; Gunal, E.S. Preserving Privacy in Personal Data Processing. In Proceedings of the 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 6–7 November 2019; pp. 1–4. [Google Scholar]
- Karafili, E.; Lupu, E.C.; Cullen, A.; Williams, B.; Arunkumar, S.; Calo, S. Improving data sharing in data rich environments. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 2998–3005. [Google Scholar]
- Harvard Business Review: SF Express: Data wars. Ivey Publishing. 2018. Available online: https://store.hbr.org/product/sf-express-data-wars/w18544?sku=W18544-HCB-ENG# (accessed on 24 September 2018).
- Katz, G.; Elovici, Y.; Shapira, B. CoBAn: A context-based model for data breach prevention. Inf. Sci. 2014, 262, 137–158. [Google Scholar] [CrossRef]
- Hauer, B. Data and Information Leakage Prevention within the Scope of Information Security. IEEE Access 2015, 3, 2554–2565. [Google Scholar] [CrossRef]
- Guevara, C.; Santos, M.; Lopez, V. Data breach detection algorithm based on task sequences and probabilities. IEEE Trans. Knowl. Data Eng. 2011, 23, 51–63. [Google Scholar]
- Al-Zaben, N.; Onik, M.M.H.; Yang, J.; Lee, N.; Kim, C. General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management. In Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 77–82. [Google Scholar]
- Gwebu, K.L.; Jing, W.; Li, W. The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management. J. Manage. Inform. Syst. 2018, 35, 683–714. [Google Scholar] [CrossRef]
- Ghouse, M.; Nene, M.J.; VembuSelvi, C. Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques. In Proceedings of the 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India, 20–21 December 2019; pp. 1–6. [Google Scholar]
- Yue, L.; Junqin, H.; Shengzhi, Q.; Ruijin, W. Big Data Model of Security Sharing Based on Blockchain. In Proceedings of the 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM), Chengdu, China, 10–11 August 2017; pp. 117–121. [Google Scholar]
- Shen, J.; Zhou, T.; He, D.; Zhang, Y.; Sun, X.; Xiang, Y. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 2019, 16, 996–1010. [Google Scholar] [CrossRef]
- Nicholson, J.; Tasker, I. Data Exchange: Privacy by design for data sharing in education. In Proceedings of the 2017 International Conference on the Frontiers and Advances in Data Science (FADS), Xi’an, China, 23–25 October 2017; pp. 92–97. [Google Scholar]
- Acquisti, A.; Brandimarte, L.; Loewenstein, G. Privacy and human behavior in the age of information. Science 2015, 347, 509–514. [Google Scholar] [CrossRef] [PubMed]
- Ouyang, Q.; Chao, W.U. Study on influencing factors of safety big data sharing and its model construction. J. Saf. Sci. Technol. 2017, 13, 27–32. [Google Scholar]
- Zhen, J.; Xie, Z.; Dong, K. Information security pressure and employee violation willingness: Regulated intermediary effect. Manage 2018, 31, 01–102. [Google Scholar]
- Dong, X.; Li, R.; He, H. Secure sensitive data sharing on a large data platform. Tsinghua Sci. Technol. 2015, 20, 72–80. [Google Scholar] [CrossRef] [Green Version]
- Truong, N.B.; Sun, K.; Lee, G.M.; Guo, Y. GDPR-Compliant Personal Data Management: A Blockchain-Based Solution. IEEE Trans. Inf. Forensic Secur 2020, 15, 1746–1761. [Google Scholar] [CrossRef] [Green Version]
- Fengmei, Y.; Anying, W.; Jun, W. Research on E-commerce credit supervision mechanism under C2B2C mode based on game theory. Syst. Eng. Theory Pract. 2017, 37, 2102–2110. [Google Scholar]
- Susha, I.; Janssen, M.; Verhulst, S.; Pardo, T. Data collaboratives: How to create value from data for public problem solving? In Proceedings of the 18th Annual International Conference on Digital Government Research, Staten Island, NY, USA, June 2017; pp. 604–606. [Google Scholar]
- Newman, A.L. What the “right to be forgotten” means for privacy in a digital age. Science 2015, 347, 507–508. [Google Scholar] [CrossRef]
- Sooksatra, K.; Li, W.; Mei, B.; Alrawais, A.; Wang, S.; Yu, J. Solving data trading dilemma with asymmetric incomplete information using zero-determinant strategy. Proceedings of International Conference on Wireless Algorithms, Systems, and Applications, Tianjin, China, 20–22 June, 2018; Springer: Cham, Switzerland, 2018; pp. 425–437. [Google Scholar]
- DeBeck, C. 3 Biggest Factors in Data Breach Costs and How to Reduce Them. September 25; Security Intelligence. Available online: https://securityintelligence.com/posts/data-breach-three-biggest-factors-in-cost/ (accessed on 25 September 2020).
Symbol | Definition | Range |
---|---|---|
Benefits of data sharing | ||
Benefits of leaking other company data | ||
Loss of data leaked | ||
Data quality | ||
Scale of shared data | ||
Probability of leak data being discovered | ||
Relative technical level between companies | ||
Scale of leaked data | , | |
Proportion of leaking data | , | |
Relevance degree between data Leaked loss and benefits of Data Leaking | ||
Degree of punishment | ||
Fines for companies that leaking data |
Company A/B | ||
---|---|---|
Scale of shared data | |
Data quality | |
Proportion of leaking data | |
Degree of punishment | severe penalty mild penalty |
Relevance degree between data Leaked loss and benefits of Data Leaking |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, H.; He, X. Corporate Data Sharing, Leakage, and Supervision Mechanism Research. Sustainability 2021, 13, 931. https://doi.org/10.3390/su13020931
Yu H, He X. Corporate Data Sharing, Leakage, and Supervision Mechanism Research. Sustainability. 2021; 13(2):931. https://doi.org/10.3390/su13020931
Chicago/Turabian StyleYu, Haifei, and Xinyu He. 2021. "Corporate Data Sharing, Leakage, and Supervision Mechanism Research" Sustainability 13, no. 2: 931. https://doi.org/10.3390/su13020931
APA StyleYu, H., & He, X. (2021). Corporate Data Sharing, Leakage, and Supervision Mechanism Research. Sustainability, 13(2), 931. https://doi.org/10.3390/su13020931